ch 10: Information Systems Security Flashcards

1
Q

what is the goal of information systems security

A

-it is really about trade offs btw security and freedom

(ex loss of freedom of choosing your own password in echnage for increased security as you are forced to create a stronger pw making it diffucult for hackers to crack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

also a trade off of what

A

cost and risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a threat

A

a person/org that seeks to obtain or alter data or other info systems assets illegally without having the owners persmission and often without the owners knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a vulnerability is

A

an opportunity for threats to gain access to individual/org assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

whats a safeguard

A

some measure that individuals/org take to block the threat from obtaining the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the target

A

the asset that is desired by the threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the types of threats

A

-human error, computer crime, natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the types of losss

A

-unauthroized data disclosure
-incorrect data modification
-faulty service
-denial of service
-loss of infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unauthorized data disclosure

A

-social engineering
-pretexting
-phishing
-spoofing
- ip/email spoofing
-sniffing
-packet sniffer/analyzer
-natural disasters
-hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

sniffing/packet sniffers

A

a technique for intercepting computer communications. with wired networks, sniffing requires a physical connection to the network. with wireless networks, no connection is required and wardrivers are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

war drivers

A

take computers with wireless connections through an area and search for unprotected wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hacking

A

activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

incorrect data modification

A

-procedures incorreclt designed or not followed
-ex increasing customers discount or incorrectly modiying employees salary
-placing incorrect data on company web site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

incorrect data modification cause

A

-improper internal controls systems
-system errors
-faulty recovery actions after a diseaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

faulty service

A

include problems that result bc of incorrect system operation
-incorrect DM
-procedural mistakes
-programming errors
-it installation errors
-usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is usurpation

A

when computer criminals invade a comp system and replace legitmate probles with their own, unauthorized ones that shut down legitimate applications and
substitute their own processing to spy, steal and manipulate data, or
achieve other purposes.

17
Q

denial of service (DoS)

A

human error or lack of procedures
-humans inadvertently shut down a web server or corporate gateway router by starting a computationaly intensive application

dos attacks
-malicious hacker intentionally floods a web server with millions of bogus service requests

 -computer worms create artifical traffic so legitimate traffic cannot get thru
18
Q

loss of infrastructure

A

-human accidents
-theof/terrorist events
-disgruntled/terminated employee
-natural disasters
-advanced persistent threat (APT)

19
Q

protective actions

A

-use antiservice software
-delete browser cookies
-make appropriate trade off to protect you and ur bsuiness

20
Q

current highest computer crime

A

malicious code

21
Q

how should you respond to security threats (5)

A

-create strong pw
-use multiple pw
-take security seriously
-send no valuable data via email or im
-use https at trusted, reputable vendors

22
Q

how should organizations respond to security threats

A

senior management create company wide policies
-what sensitive data will be stored
-how will data be processed
-how will data be shared with other organizations
-how can employees and others request changes to inaccurate data

23
Q

teachincal safegaurds on

A

-hardware and software

-firewalls
-identification and authorization
-malware

24
Q

data safegaurds on data

A

-passwords
-encryption
-backup and recovery

25
Q

human safeguards on procedures and people

A

-hiring
-training
-education

26
Q

identification

A

identifies the user

27
Q

authentication

A

-authenticates the user (pw)
-personal identification number, biometric authentixation such as finger prints, and single sign on

28
Q

encryption

A

process of transforming clear text into coded, unintelligible text for secure storage or communication

29
Q

key

A

string of bits used to encrypt data (unlocks message)

different for symmetric encryption and asymmetric encryption

30
Q

symmetric encryption

A

the same key is used encode and to decode

31
Q

asymmetric encryption

A

2 keys are used, 1 key encodes the message and the other key decods the message

32
Q

firewalls

A

computing device that prevents unauthorized access

-perimeter firewall sits outside the organization network

-internal firewall sits inside the network

-packet filtering firewall examines each part of messahe and determines whetehr to ket that part pass basing it off ip source and other data

33
Q

spyware and adware symptoms

A

-slow system start up
-many advertisinments
-suspicious broswer homepage changes
-suspicious changes to the taskbar

34
Q

malware symptoms

A

-viruses
-trojan horses
-worms
-spyware
-adware
-ransomeware

35
Q

malware protections

A

-antivirus and antispyware systems
-open emails only from known sources
-install software updates

36
Q

position definitions

A

-seperate duties and authorites
-determine least privledge
-document position sensitivity

37
Q

dissemination and enforcement

A

responisbility
accountability
complience

38
Q

termination

A

friendly/unfriendly

39
Q

How can human safeguards protect against security
threats?

A

Account Management
– Standards for new user accounts, modification
of account permissions, removal of unneeded
accounts

Password Management
– Users change passwords frequently

Help Desk Policies
– Provide means of authenticating users